{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:38:57Z","timestamp":1743025137806,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642415234"},{"type":"electronic","value":"9783642415241"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41524-1_8","type":"book-chapter","created":{"date-parts":[[2013,11,15]],"date-time":"2013-11-15T10:48:20Z","timestamp":1384512500000},"page":"134-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Confidentiality-Preserving Publishing of EDPs for Credulous and Skeptical Users"],"prefix":"10.1007","author":[{"given":"Katsumi","family":"Inoue","sequence":"first","affiliation":[]},{"given":"Chiaki","family":"Sakama","sequence":"additional","affiliation":[]},{"given":"Lena","family":"Wiese","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,16]]},"reference":[{"key":"8_CR1","first-page":"31","volume-title":"ICDT 2009. ACM International Conference Proceeding Series","author":"FN Afrati","year":"2009","unstructured":"Afrati, F.N., Kolaitis, P.G.: Repair checking in inconsistent databases: algorithms and complexity. ICDT 2009. ACM International Conference Proceeding Series, vol. 361, pp. 31\u201341. ACM, New York (2009)"},{"key":"8_CR2","first-page":"80","volume-title":"DNIS 2010. LNCS","author":"J Biskup","year":"2010","unstructured":"Biskup, J.: Usability confinement of server reactions: maintaining inference-proof client views by controlled interaction execution. In: Kikuchi, S., Sachdeva, S., Bhalla, S. (eds.) DNIS 2010. LNCS, vol. 5999, pp. 80\u2013106. Springer, Heidelberg (2010)"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/69.390247","volume":"7","author":"PA Bonatti","year":"1995","unstructured":"Bonatti, P.A., Kraus, S., Subrahmanian, V.S.: Foundations of secure deductive databases. IEEE Trans. Knowl. Data Eng. 7(3), 406\u2013422 (1995)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"8_CR4","first-page":"388","volume-title":"LPNMR 2011. LNCS","author":"F Calimeri","year":"2011","unstructured":"Calimeri, F., et al.: The third answer set programming competition: preliminary report of the system competition track. In: Delgrande, J.P., Faber, W. (eds.) LPNMR 2011. LNCS, vol. 6645, pp. 388\u2013403. Springer, Heidelberg (2011)"},{"key":"8_CR5","first-page":"637","volume-title":"LPAR 2005. LNCS (LNAI)","author":"J Dix","year":"2005","unstructured":"Dix, J., Faber, W., Subrahmanian, V.S.: The relationship between reasoning about privacy and default logics. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835, pp. 637\u2013650. Springer, Heidelberg (2005)"},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/772862.772864","volume":"4","author":"C Farkas","year":"2002","unstructured":"Farkas, C., Jajodia, S.: The inference problem: a survey. SIGKDD Explor. 4(2), 6\u201311 (2002)","journal-title":"SIGKDD Explor."},{"issue":"3\/4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/BF03037169","volume":"9","author":"M Gelfond","year":"1991","unstructured":"Gelfond, M., Lifschitz, V.: Classical negation in logic programs and disjunctive databases. New Gen. Comput. 9(3\/4), 365\u2013386 (1991)","journal-title":"New Gen. Comput."},{"key":"8_CR8","unstructured":"Grau, B.C., Horrocks, I.: Privacy-preserving query answering in logic-based information systems. In: ECAI 2008. Frontiers in Artificial Intelligence and Applications, vol. 178, pp. 40\u201344. IOS Press (2008)"},{"key":"8_CR9","unstructured":"Inoue, K., Sakama, C.: Abductive framework for nonmonotonic theory change. In: Fourteenth International Joint Conference on Artificial Intelligence (IJCAI 95), vol. 1, pp. 204\u2013210. Morgan Kaufmann (1995)"},{"key":"8_CR10","unstructured":"Inoue, K., Sakama, C., Wiese, L.: Confidentiality-preserving data publishing for credulous users by extended abduction. Paper appears in the Proceedings of the 19th International Conference on Applications of Declarative Programming and Knowledge Management (INAP 2011), arXiv:1108.5825 (2011)"},{"key":"8_CR11","unstructured":"Ma, J., Russo, A., Broda, K., Lupu, E.: Multi-agent confidential abductive reasoning. In: ICLP (Technical Communications). LIPIcs, vol. 11, pp. 175\u2013186. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2011)"},{"key":"8_CR12","unstructured":"Sakama, C.: Dishonest reasoning by abduction. In: 22nd International Joint Conference on Artificial Intelligence (IJCAI 2011), pp. 1063\u20131064. IJCAI\/AAAI (2011)"},{"issue":"6","key":"8_CR13","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1017\/S1471068403001716","volume":"3","author":"C Sakama","year":"2003","unstructured":"Sakama, C., Inoue, K.: An abductive framework for computing knowledge base updates. Theor. Pract. Logic Program. 3(6), 671\u2013713 (2003)","journal-title":"Theor. Pract. Logic Program."},{"key":"8_CR14","first-page":"409","volume-title":"LFCS 2009. LNCS","author":"P Stouppa","year":"2008","unstructured":"Stouppa, P., Studer, T.: Data privacy for $$\\cal ALC$$ knowledge bases. In: Artemov, S., Nerode, A. (eds.) LFCS 2009. LNCS, vol. 5407, pp. 409\u2013421. Springer, Heidelberg (2008)"},{"issue":"1","key":"8_CR15","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.cose.2009.07.004","volume":"29","author":"TS Toland","year":"2010","unstructured":"Toland, T.S., Farkas, C., Eastman, C.M.: The inference problem: Maintaining maximal availability in the presence of database updates. Comput. Secur. 29(1), 88\u2013103 (2010)","journal-title":"Comput. Secur."},{"key":"8_CR16","first-page":"101","volume-title":"IWSEC 2010. LNCS","author":"L Wiese","year":"2010","unstructured":"Wiese, L.: Horizontal fragmentation for data outsourcing with formula-based confidentiality constraints. In: Echizen, I., Kunihiro, N., Sasaki, R. (eds.) IWSEC 2010. LNCS, vol. 6434, pp. 101\u2013116. Springer, Heidelberg (2010)"},{"issue":"8","key":"8_CR17","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1016\/j.datak.2010.02.009","volume":"69","author":"L Zhao","year":"2010","unstructured":"Zhao, L., Qian, J., Chang, L., Cai, G.: Using ASP for knowledge management with user authorization. Data Knowl. Eng. 69(8), 737\u2013762 (2010)","journal-title":"Data Knowl. Eng."}],"container-title":["Lecture Notes in Computer Science","Applications of Declarative Programming and Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41524-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,16]],"date-time":"2023-02-16T21:27:03Z","timestamp":1676582823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-41524-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642415234","9783642415241"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41524-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"16 November 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}